Skip to content

Welcome to Hunter Phishing Domain! This repository curates a collection of useful tools for identifying lookalike and squatted domains often used in phishing attacks. These tools leverage techniques such as LookAlike and Domain Squatting to detect domains that mimic legitimate ones.

License

Notifications You must be signed in to change notification settings

4st3rIkxx/HunterPhishingDomain

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 

Repository files navigation

Hunter Phishing Domain 🔍🎣

This repository gathers a collection of useful tools to identify similar domains frequently used in phishing attacks. These tools apply various techniques, including LookAlike and Domain Squatting, to detect domains that mimic legitimate ones. The goal is to assist in the prevention and identification of phishing threats by providing a solid foundation for security analysis and cyber investigations.

Features 🚀

  • LookAlike Domains 🔎: Tools to detect domains that visually resemble legitimate ones by exploiting small character changes.

  • Domain Squatting 📛: Identification of domains registered with names similar to well-known companies or brands, aiming to deceive users.

  • Phishing Analysis 🛡️: Methods to analyze and verify suspicious domains that may be used in phishing campaigns.

  • Automated Search 🤖: Scripts and automated tools to facilitate the search and monitoring of similar domains.

Tools 🛠️

Web 🌐
Script Tools 🤖⚙️

Licença 📄

This project is licensed under the MIT License - see the LICENSE file for more details.

About

Welcome to Hunter Phishing Domain! This repository curates a collection of useful tools for identifying lookalike and squatted domains often used in phishing attacks. These tools leverage techniques such as LookAlike and Domain Squatting to detect domains that mimic legitimate ones.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published